Description
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
References (13)
Core 13
Core References
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3617-1/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3619-2/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4082
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3617-3/
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3632-1/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/102227
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3620-2/
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://www.spinics.net/lists/kvm/msg160796.html
Issue Tracking, Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2017/dsa-4073
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3617-2/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3620-1/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3619-1/
Scores
CVSS v3
6.5
EPSS
0.0006
EPSS Percentile
17.2%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Details
CWE
CWE-125
Status
published
Products (2)
debian/debian_linux
9.0
linux/linux_kernel
< 4.14.7
Published
Dec 18, 2017
Tracked Since
Feb 18, 2026